Teams of 6-8 • Each person does ONE Section of Cybersafety • Each person gets SIX slides
Your team will present Tuesday or Wednesday night, 9/22/09 or 9/23/09 (Teams with volleyball players will NEED to present on the 23rd) Our Theme is LARK (Legal, Appropriate, Responsible & Kind)
Please Have the word LEGAL, APPROPRIATE, RESPONSIBLE or KIND on each slide it applies to:
For example, a slide about illegal downloading would have "Legal" at the bottom, a slide about bullying might have "Appropriate" and "Kind" at the bottom.....
The sections:
1. Identity Theft 2. Not Being Bullied Online 3. File Piracy and Illegal Downloading 4. Safe Social Networking 5. Filtering Bad Content 6. School AUPs *Bonus: Only if you have seven people: 7. Cyberpredators
The preso:
Take all your notes, keep images in Evernote.
It needs to be retyped NOT Copy/Pasted (Lani) into a Google Doc before you make the Google Presentation.
The Google Presentation will be built cooperatively, in one big preso. This way, you can work togetether.
Each six slide section should include:
1 Title slide
1 Slide summarizing the problem or danger (should have at least 5 facts)
2 Slides from a news article about the (not a blog, but NEWS, as in ABC, FOX, CNN, New York Times) hint: add the word news to your title in a google search
1 Slide about how to protect yourself
1 Slide with four resources you used in Easybib format
Each Slide (except the Title slide and Citation slide)will include:
A Title
A Subtitle
5 facts (bullet or paragraph format)
1 picture
1 quote about that slide's concept
Use only the Following Resources (do not just Google it):
What it is (schools have to abide by CIPA and COPA):
en.wikipedia.org/wiki/Children%27s_Internet_Protection_Act
www.ala.org/ala/aboutala/offices/oif/ifissues/issuesrelatedlinks/cppacopacipa.cfm
Teams of 6-8 • Each person does ONE Section of Cybersafety • Each person gets SIX slides
Your team will present Tuesday or Wednesday night, 9/22/09 or 9/23/09
(Teams with volleyball players will NEED to present on the 23rd)
Our Theme is LARK (Legal, Appropriate, Responsible & Kind)
Please Have the word LEGAL, APPROPRIATE, RESPONSIBLE or KIND on each slide it applies to:
For example, a slide about illegal downloading would have "Legal" at the bottom, a slide about bullying might have "Appropriate" and "Kind" at the bottom.....
The sections:
1. Identity Theft 2. Not Being Bullied Online 3. File Piracy and Illegal Downloading 4. Safe Social Networking 5. Filtering Bad Content 6. School AUPs *Bonus: Only if you have seven people: 7. Cyberpredators
The preso:
Take all your notes, keep images in Evernote.
It needs to be retyped NOT Copy/Pasted (Lani) into a Google Doc before you make the Google Presentation.
The Google Presentation will be built cooperatively, in one big preso. This way, you can work togetether.
Each six slide section should include:
Each Slide (except the Title slide and Citation slide)will include:
Use only the Following Resources (do not just Google it):
Identity Theft:
Play Antiphishing Phil
http://cups.cs.cmu.edu/antiphishing_phil/new/index.html
Learn what it is:
http://www.commoncraft.com/phishing
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/27/AR2009082702276.html?hpid=sec-business
News: http://www.washingtonpost.com/wp-dyn/content/article/2009/08/28/AR2009082803779.html
Protect yourself:
http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html
http://tcs.cybertipline.com/knowthedangers8.htm
Online Bullying:
Learn what it is (almost everything needed is here):
http://www.stopcyberbullying.org/index2.html
NEWS:
(pay special attention to the last paragraph of this one)
http://news.cnet.com/When-cyberbullying-hits-teens/2010-1030_3-6201365.html
Protect yourself:
Video: http://www.netsmartz.org/stories/angela.htm
http://www.thisisnottingham.co.uk/news/Post-Comment-Old-fashioned-action-online-bullies/article-1105966-detail/article.html
Protect yourself (other fixes):
http://gaetc-ejournal.org/instruction/cyberbullies/cyberbully.htm
http://www.safetyclicks.com/2008/11/13/what-can-you-do-if-your-child-is-bullied-online/
File Piracy and Illegal Downloading
What is it? http://www.it.northwestern.edu/security/illegaldownloading/index.html
http://www.stfrancis.edu/content/cid/copyrightbay/bg001.htm
http://www.stfrancis.edu/content/cid/copyrightbay/av1.htm
NEWS:
http://media.www.westerncourier.com/media/storage/paper650/news/2006/10/02/News/Illegal.Downloading.May.Cost.Jobs-2320050.shtml
http://technology.timesonline.co.uk/tol/news/tech_and_web/the_web/article3353387.ece
http://www.eschoolnews.com/news/top-news/news-by-subject/litigation/index.cfm?i=59977
Protect yourself (other fixes): http://creativecommons.org/about/what-is-cc
Safe Social Networking
What it is:
http://www.commoncraft.com/video-social-networking
http://news.cnet.com/When-cyberbullying-hits-teens/2010-1030_3-6201365.html
News:
http://www.wired.com/culture/education/news/2007/04/myspaceforschool
http://www.pbs.org/teachers/learning.now/2008/07/pbs_teachers_embraces_social_n_1.html
Protect yourself:
http://tcs.cybertipline.com/knowthedangers.htm
http://www.wiredsafety.org/safety/chat_safety/phone_safety/sms7.html
Filtering Bad Content
What it is (schools have to abide by CIPA and COPA):
en.wikipedia.org/wiki/Children%27s_Internet_Protection_Act
www.ala.org/ala/aboutala/offices/oif/ifissues/issuesrelatedlinks/cppacopacipa.cfm
News:
http://www.abc.net.au/news/stories/2008/10/24/2399876.htm
www.articlesbase.com/internet-articles/growing-use-of-internet-filter-software-420166.html
Protect Yourself (all free):
http://kids.getnetwise.org/trouble/
www1.k9webprotection.com/
www.opendns.com/solutions/homenetwork/
Parental Controls in Vista: www.microsoft.com/windows/windows-vista/features/parental-controls.aspx
Parental Controls in Mac OSX: http://support.apple.com/kb/HT2900
School AUPs
What it is: (For this section there is no "protect yourself" slide, do two slides on Chawanakee's AUP, list ten things kids should know)
http://www.education-world.com/a_curr/curr093.shtml
http://www.usdoj.gov/criminal/cybercrime/rules/acceptableUsePolicy.htm
News:
http://www.eschoolnews.com/news/top-news/index.cfm?i=54654
http://news.cnet.com/8301-19518_3-10280411-238.html
Chawanakee's Student AUP
http://www.chawanakee.k12.ca.us/district/human_resources/Documents/STUDENT%20INTERNET%20AUP%20081106.pdf
Cyberpredators
Play ID the Creep:http://www.idthecreep.com/
What they are:
http://www.unh.edu/ccrc/
http://www.wiredsafety.org/internet101/aromance.html
http://tcs.cybertipline.com/knowthedangers1.htm
News:
http://www.khnl.com/global/story.asp?S=6014430
http://www.abc.net.au/news/stories/2006/04/26/1624526.htm
http://www.carrollcountycomet.com/news/2006/0111/Front_Page/006.html
Protect yourself:
http://www.missingkids.com/adcouncil/talk.html
http://www.safeteens.com/2009/02/11/predator-panic-a-risky-distraction/